# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (yes) (never) (100)
# ==========================================================================
-#submission inet n - - - - smtpd
-# -o smtpd_tls_security_level=encrypt
-# -o smtpd_sasl_auth_enable=yes
-# -o smtpd_client_restrictions=permit_sasl_authenticated,reject
-# -o milter_macro_daemon_name=ORIGINATING
+submission inet n - - - - smtpd
+ -o smtpd_tls_security_level=encrypt
+ -o smtpd_sasl_auth_enable=yes
+ -o smtpd_client_restrictions=permit_sasl_authenticated,reject
+ -o milter_macro_daemon_name=ORIGINATING
+ -o smtpd_proxy_filter=127.0.0.1:10025
+ -o smtpd_client_connection_count_limit=15
#smtps inet n - - - - smtpd
# -o smtpd_tls_wrappermode=yes
# -o smtpd_sasl_auth_enable=yes
# Before-filter SMTP server. Receive mail from the network and
# pass it to the content filter on localhost port 10025.
#
-smtp inet n - - - 15 smtpd
+# I *think* that the maxproc cap wants to be no more than the number
+# of spampd processes that can run, but I'm not really sure
+# (and hopefully it doesn't *really* matter)
+smtp inet n - - - 5 smtpd
-o smtpd_proxy_filter=127.0.0.1:10025
- -o smtpd_client_connection_count_limit=10
+ -o smtpd_client_connection_count_limit=15
#
# After-filter SMTP server. Receive mail from the content filter
# on localhost port 10026.
-o mynetworks=127.0.0.0/8
-o receive_override_options=no_unknown_recipient_checks
+smtp-forward unix - - n - - smtp -o smtp_bind_address=18.102.208.11
+smtp-local unix - - n - - smtp -o smtp_bind_address=18.102.208.44
+
# When relaying mail as backup MX, disable fallback_relay to avoid MX loops
relay unix - - - - - smtp
-o smtp_fallback_relay=
lmtp unix - - - - - lmtp
anvil unix - - - - 1 anvil
scache unix - - - - 1 scache
+
#
# ====================================================================
# Interfaces to non-Postfix software. Be sure to examine the manual